Static task
static1
Behavioral task
behavioral1
Sample
65afe1ada457384befcc1f90b4525bc6c3a15111e2477dcc57e83a9b576856d3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
65afe1ada457384befcc1f90b4525bc6c3a15111e2477dcc57e83a9b576856d3.exe
Resource
win10v2004-20221111-en
General
-
Target
65afe1ada457384befcc1f90b4525bc6c3a15111e2477dcc57e83a9b576856d3
-
Size
98KB
-
MD5
1b2ae1d2398b96f8bbd83af1cc3453a7
-
SHA1
356d8eac99c78365a1da2abd8cdfcfbef7606f23
-
SHA256
65afe1ada457384befcc1f90b4525bc6c3a15111e2477dcc57e83a9b576856d3
-
SHA512
584d1d9a4baba8d5faaeba5b60ee75c1f7aade78c237304711e4ee60adabd4bad1af28095b7bf9305b6498842fb7a1df9e3d33cf49813c949182ab8ee6b32cf8
-
SSDEEP
1536:+X5rLGUPMWLpbQ/UTO7xTzq0rkDyry9vF1Xc/00m3F1UaB/RCF2:K6UrccuTzq0rkDcMt1g7m3HUkRL
Malware Config
Signatures
Files
-
65afe1ada457384befcc1f90b4525bc6c3a15111e2477dcc57e83a9b576856d3.exe windows x86
c696ae699d135c594cf29a24a66170e6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThreadId
GetDriveTypeA
TlsGetValue
LoadLibraryW
IsBadStringPtrW
InitializeCriticalSection
WriteFile
HeapCreate
GetEnvironmentVariableW
ReleaseMutex
lstrlenW
CreateEventW
ReleaseMutex
GetPrivateProfileStringA
GetFileTime
FindClose
GlobalFlags
FindAtomA
LocalFree
GetCurrentProcessId
user32
GetClassInfoA
DrawStateW
CreateWindowExA
GetClientRect
GetSysColor
GetSysColor
SetFocus
GetKeyboardType
IsWindow
EndDialog
DrawTextA
CallWindowProcW
DispatchMessageA
rastapi
DeviceDone
DeviceDone
DeviceDone
DeviceDone
DeviceDone
clbcatq
DllGetClassObject
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 88KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE